Blog
By Joseph Carson
Cyberattacks though commonly reported as sophisticated, often are not. They are surprisingly simple and usually financially motivated. It seems so often that the media report that another so-called “sophisticated cyberattack” has breached a company’s security defenses causing widespread disruption at a huge financial cost. But cybercriminals’ methods are not always
The Impact of Artificial Intelligence on Cyber Security
August 22, 2019
0 Comment
By AIMEE LAURENCE
There is currently a big debate raging about whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life. With more and more enterprises using AI for their needs, it’s time to analyze the possible impacts of the implementation of AI in the
Mobile Identity Is The New Security Perimeter
August 22, 2019
0 Comment
By Louis Columbus
86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets. Mobile devices are hackers’ favorite platform to target, with
Mobile apps: Insecure by default
August 21, 2019
0 Comment
By Taylor Armerding
They are the best of apps. They are the worst of apps. At the same time. Mobile applications have unlocked a world of almost magical convenience, communication and creativity. With a few swipes or taps on your smartphone you can buy food, clothes or just about any other product, pay
Is Cybersecurity Automation The Future?
August 20, 2019
0 Comment
By Darren Death
One of the trending topics in information technology is cybersecurity automation. Automating mundane and repeatable tasks that are people-driven allows businesses and individuals to concentrate on more productive problem-solving activities. A focus on these problem-solving activities can foster innovation and lead to a more resilient organization from a cybersecurity standpoint.